Filename Size 1. Introduction/1. The Undeniable Power of Ethical Hacking.mp4 11.6 MB 1. Introduction/1. The Undeniable Power of Ethical Hacking.srt 3.2 KB 10. Proven Social Engineering Techniques/1. Attack Vectors.mp4 14.7 MB 10. Proven Social Engineering Techniques/1. Attack Vectors.srt 5.1 KB 10. Proven Social Engineering Techniques/2. Open-source Intelligence (OSINT).mp4 6.7 MB 10. Proven Social Engineering Techniques/2. Open-source Intelligence (OSINT).srt 1.8 KB 10. Proven Social Engineering Techniques/3. Google Dorks Live Examples.mp4 60.1 MB 10. Proven Social Engineering Techniques/3. Google Dorks Live Examples.srt 7.6 KB 10. Proven Social Engineering Techniques/3.1 Sample Google Dorks.txt 299 B 10. Proven Social Engineering Techniques/3.2 Exploit Database.html 88 B 10. Proven Social Engineering Techniques/4. Track and Spoof Emails Easily.mp4 37.6 MB 10. Proven Social Engineering Techniques/4. Track and Spoof Emails Easily.srt 4.5 KB 10. Proven Social Engineering Techniques/5. Collect and Visualize Data with Maltego.mp4 68.5 MB 10. Proven Social Engineering Techniques/5. Collect and Visualize Data with Maltego.srt 6.3 KB 10. Proven Social Engineering Techniques/6. Execute a Phishing Attack.mp4 72 MB 10. Proven Social Engineering Techniques/6. Execute a Phishing Attack.srt 5.7 KB 10. Proven Social Engineering Techniques/7. Hack Facebook, Twitter, and Gmail Accounts.mp4 88.5 MB 10. Proven Social Engineering Techniques/7. Hack Facebook, Twitter, and Gmail Accounts.srt 7.2 KB 11. Attack Mobile Phones/1. Mobile Attack Surface.mp4 14.4 MB 11. Attack Mobile Phones/1. Mobile Attack Surface.srt 5.1 KB 11. Attack Mobile Phones/2. Decrypt SSL Session.mp4 91.2 MB 11. Attack Mobile Phones/2. Decrypt SSL Session.srt 14.2 KB 11. Attack Mobile Phones/3. Reverse Engineer an Android Application.mp4 78.8 MB 11. Attack Mobile Phones/3. Reverse Engineer an Android Application.srt 7.4 KB 11. Attack Mobile Phones/3.1 ProGuard.html 109 B 11. Attack Mobile Phones/4. Hack an Android Phone and Download its Contacts.mp4 74.4 MB 11. Attack Mobile Phones/4. Hack an Android Phone and Download its Contacts.srt 7.3 KB 12. Maintain Access/1. Post-Exploitation Terminologies.mp4 13.2 MB 12. Maintain Access/1. Post-Exploitation Terminologies.srt 5 KB 12. Maintain Access/2. Backdoor Tools Explained.mp4 15 MB 12. Maintain Access/2. Backdoor Tools Explained.srt 4.8 KB 12. Maintain Access/3. Netcat Simplified.mp4 97.7 MB 12. Maintain Access/3. Netcat Simplified.srt 12.6 KB 12. Maintain Access/3.1 Netcat Download Source 2.html 100 B 12. Maintain Access/3.2 Netcat Download Source 1.html 94 B 12. Maintain Access/4. Install a Backdoor.mp4 95.1 MB 12. Maintain Access/4. Install a Backdoor.srt 6.3 KB 12. Maintain Access/5. Deface a Website in Few Seconds.mp4 54.6 MB 12. Maintain Access/5. Deface a Website in Few Seconds.srt 5.4 KB 12. Maintain Access/6. Create a Simple Ransomware.mp4 33.5 MB 12. Maintain Access/6. Create a Simple Ransomware.srt 3.5 KB 12. Maintain Access/7. Understand Hidden Tear Ransomware.mp4 109.9 MB 12. Maintain Access/7. Understand Hidden Tear Ransomware.srt 109.9 MB 12. Maintain Access/7.1 Hidden Tear Source Code.html 99 B 12. Maintain Access/8. Bypass Firewalls by Tunneling Data and Commands over DNS.mp4 69.5 MB 12. Maintain Access/8. Bypass Firewalls by Tunneling Data and Commands over DNS.srt 6.5 KB 13. Let’s Get Real/1. Publish Your Weapons Online.mp4 31.3 MB 13. Let’s Get Real/1. Publish Your Weapons Online.srt 3.8 KB 13. Let’s Get Real/1.1 Setup DNSCAT.txt 185 B 13. Let’s Get Real/2. Stay Anonymous Online.mp4 41.9 MB 13. Let’s Get Real/2. Stay Anonymous Online.srt 28 MB 13. Let’s Get Real/2.1 NO IP.html 82 B 13. Let’s Get Real/3. Setup a Stealthy Command and Control Center Online.mp4 51.2 MB 13. Let’s Get Real/3. Setup a Stealthy Command and Control Center Online.srt 6.1 KB 14. How to Prepare and Present Your Report/1. Report Writing Techniques.mp4 87.5 MB 14. How to Prepare and Present Your Report/1. Report Writing Techniques.srt 15.1 KB 14. How to Prepare and Present Your Report/2. How Can Pentest.ws Help You.mp4 71 MB 14. How to Prepare and Present Your Report/2. How Can Pentest.ws Help You.srt 71 MB 14. How to Prepare and Present Your Report/2.1 Pentest.ws.html 84 B 15. Secret Sauce BONUS/1. Create a WiFi Jammer.mp4 127.4 MB 15. Secret Sauce BONUS/1. Create a WiFi Jammer.srt 11.9 KB 15. Secret Sauce BONUS/2. Create a $3 Rubber Ducky Key-logger.mp4 113.1 MB 15. Secret Sauce BONUS/2. Create a $3 Rubber Ducky Key-logger.srt 11.3 KB 15. Secret Sauce BONUS/2.1 Extra Resource List 3.html 84 B 15. Secret Sauce BONUS/2.2 Extra Resource List 2.html 84 B 15. Secret Sauce BONUS/2.3 Extra Resource List 5.html 84 B 15. Secret Sauce BONUS/2.4 Extra Resource List 1.html 84 B 15. Secret Sauce BONUS/2.5 Extra Resource List 7.html 84 B 15. Secret Sauce BONUS/2.6 Extra Resource List 4.html 84 B 15. Secret Sauce BONUS/2.7 Extra Resource List 6.html 84 B 15. Secret Sauce BONUS/2.8 Course File Resources.html 97 B 15. Secret Sauce BONUS/2.9 Extra Resource List 8.html 84 B 2. Setup Your Lab/1. Why KALI.mp4 7.6 MB 2. Setup Your Lab/1. Why KALI.srt 2.2 KB 2. Setup Your Lab/2. Different Installation Methods.mp4 4.3 MB 2. Setup Your Lab/2. Different Installation Methods.srt 903 B 2. Setup Your Lab/3. Install KALI.mp4 31.7 MB 2. Setup Your Lab/3. Install KALI.srt 5.4 KB 2. Setup Your Lab/3.1 username_update.txt 665 B 2. Setup Your Lab/4. Color Coding for Root User.mp4 8 MB 2. Setup Your Lab/4. Color Coding for Root User.srt 1 KB 2. Setup Your Lab/4.1 Bashrc File.html 97 B 2. Setup Your Lab/5. Install Windows (Victim's Machine).mp4 16.3 MB 2. Setup Your Lab/5. Install Windows (Victim's Machine).srt 2.2 KB 2. Setup Your Lab/5.1 Windows 10 Trial.html 124 B 2. Setup Your Lab/5.2 KALI VMWARE image.html 150 B 2. Setup Your Lab/5.3 VMWARE Player.html 159 B